The missing readings in various sensors of air pollution monitoring stations is a common issue. Those missing sensor readings may greatly influence the performance of monitoring and analysis of air pollution data. To ...
详细信息
The transition from traditional energy or electrical grids to smart energy or electrical grids has significantly transformed energy management. This evolution emphasizes decentralization, efficiency, and sustainabilit...
详细信息
The transition from traditional energy or electrical grids to smart energy or electrical grids has significantly transformed energy management. This evolution emphasizes decentralization, efficiency, and sustainability in energy systems. However, it also introduces numerous risks, including cyber-physical system vulnerabilities and challenges in energy trading. The application of blockchain and Machine Learning (ML) offers potential solutions to these issues. Blockchain enhances energy transactions by making them safer, more transparent, and tamper-proof, while ML optimizes grid performance by improving predictions, fault detection, and anomaly identification. This systematic review examines the application of blockchain and ML in peer-to-peer (P2P) energy trading within smart grids and analyzes how these technologies complement each other in mitigating risks and enhancing the efficiency of smart grids. Blockchain enhances security by providing privacy for transactions and maintaining immutable records, while ML predicts market trends, identifies fraudulent activities, and ensures efficient energy use. The paper identifies critical challenges in smart grids, such as unsecured communication channels and vulnerabilities to cyber threats, and discusses how blockchain and ML address these issues. Furthermore, the study explores emerging trends, such as lightweight blockchain systems and edge computing, to overcome implementation challenges. A new architecture is proposed, integrating blockchain with ML algorithms to create resilient, secure, and efficient energy trading markets. The paper underscores the need for global standardization, improved cybersecurity measures, and further research into how blockchain and ML can revolutionize smart grids. This study integrates current knowledge with a forward-looking perspective, providing valuable insights for researchers, policymakers, and stakeholders in the energy sector to collaboratively build a future of efficient and int
Medical imaging, a cornerstone of disease diagnosis and treatment planning, faces the hurdles of subjective interpretation and reliance on specialized expertise. Deep learning algorithms show improvements in automatin...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***,attackers have used advanced techniques to evade defenses by transforming their malware into functionality-preserving *** systematically analyze such evasion attacks and conduct a large-scale empirical study in this paper to evaluate their impact on *** specifically,we focus on two forms of evasion attacks:obfuscation and adversarial *** the best of our knowledge,this paper is the first to investigate and contrast the two families of evasion attacks *** apply 10 obfuscation attacks and 9 adversarial attacks to 2870 malware *** obtained findings are as follows.(1)Commercial Off-The-Shelf(COTS)malware detectors are vulnerable to evasion attacks.(2)Adversarial attacks affect COTS malware detectors slightly more effectively than obfuscated malware examples.(3)Code similarity detection approaches can be affected by obfuscated examples and are barely affected by adversarial attacks.(4)These attacks can preserve the functionality of original malware examples.
The procedure of segmenting a brain tumour is an essential step in the field of medical image processing. In order to improve the efficacy of disease treatment choices and the likelihood of patient survival, the timel...
详细信息
The skin acts as an important barrier between the body and the external environment, playing a vital role as an organ. The application of deep learning in the medical field to solve various health problems has generat...
详细信息
We studied the weekly number and the growth/decline rates of COVID-19 deaths of the period from October 31, 2022, to February 9, 2023, in Italy. We found that the COVID-19 winter wave reached its peak during the three...
详细信息
Community question answering (CQA) forums are Internet-based platforms where users ask questions about a topic and other expert users try to provide solutions. Many CQA forums such as Quora, Stackoverflow, Yahoo!Answe...
详细信息
Computational approaches can speed up the drug discovery process by predicting drug-target affinity, otherwise it is time-consuming. In this study, we developed a convolutional neural network (CNN)-based model named S...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a few research studies have focused on the application of ML especially supervised learning techniques in Requirement engineering.RE)activities to solve the problems that occur in RE *** authors focus on the systematic mapping of past work to investigate those studies that focused on the application of supervised learning techniques in RE activities between the period of 2002–*** authors aim to investigate the research trends,main RE activities,ML algorithms,and data sources that were studied during this ***-five research studies were selected based on our exclusion and inclusion *** results show that the scientific community used 57 *** those algorithms,researchers mostly used the five following ML algorithms in RE activities:Decision Tree,Support Vector Machine,Naïve Bayes,K-nearest neighbour Classifier,and Random *** results show that researchers used these algorithms in eight major RE *** activities are requirements analysis,failure prediction,effort estimation,quality,traceability,business rules identification,content classification,and detection of problems in requirements written in natural *** selected research studies used 32 private and 41 public data *** most popular data sources that were detected in selected studies are the Metric Data Programme from NASA,Predictor Models in Software engineering.and iTrust Electronic Health Care System.
暂无评论